Determining affinities for data set summarizations

    公开(公告)号:US11954127B1

    公开(公告)日:2024-04-09

    申请号:US17316421

    申请日:2021-05-10

    Applicant: Splunk Inc.

    CPC classification number: G06F16/283 G06F16/2465

    Abstract: Systems and methods are disclosed for associating summarizations of visualizations of a data set based on affinities between the summarizations. For a data set, a number of summarizations may be created that summarizes the data set in different ways. The summarizations may be linked, such that selecting a data element of a first summarization causes display of a second summarization. To assist in linking of summarizations, suggested linkings between summarizations can be determined based on affinities of the two summarizations. Affinities can reflect similarities in the data content of the two summarizations, such as an output of a first summarization being a valid input to the second summarization.

    Enhanced simple network management protocol (SNMP) connector

    公开(公告)号:US11949547B2

    公开(公告)日:2024-04-02

    申请号:US17387811

    申请日:2021-07-28

    Applicant: SPLUNK Inc.

    CPC classification number: H04L41/0213 H04L41/048 H04L67/306

    Abstract: Techniques are described for automating the configuration of a simple network management protocol (SNMP) manager device for enabling collection of SNMP data from one or more SNMP-enabled devices. Based upon SNMP object identifiers (OIDs) received from an SNMP-enabled device, processing is performed to map the OIDs to one or more SNMP management information bases (MIBs) corresponding to the OIDs. The identification of the OIDs and mapping the OIDs to one or more MIBs is performed in an automated manner and substantially free of any human or manual intervention. The identified one or more MIBs are then used to configure the SNMP manager to enable SNMP communications between the SNMP-enabled device and the SNMP manager. In certain implementations, the identified one or more MIBs are loaded into system memory by the SNMP manager.

    Reducing index file size based on event attributes

    公开(公告)号:US11934418B2

    公开(公告)日:2024-03-19

    申请号:US17447620

    申请日:2021-09-14

    Applicant: Splunk Inc.

    CPC classification number: G06F16/248 G06F16/2228 G06F16/285 G06F16/21

    Abstract: Techniques and mechanisms are disclosed to optimize the size of index files to improve use of storage space available to indexers and other components of a data intake and query system. Index files of a data intake and query system may include, among other data, a keyword portion containing mappings between keywords and location references to event data containing the keywords. Optimizing an amount of storage space used by index files may include removing, modifying and/or recreating various components of index files in response to detecting one or more storage conditions related to the event data indexed by the index files. The optimization of index files generally may attempt to manage a tradeoff between an efficiency with which search requests can be processed using the index files and an amount of storage space occupied by the index files.

    Dynamically monitoring an information technology networked entity

    公开(公告)号:US11934417B2

    公开(公告)日:2024-03-19

    申请号:US17373580

    申请日:2021-07-12

    Applicant: Splunk Inc.

    CPC classification number: G06F16/248 G06F3/04847 G06F16/9535 G06F3/04842

    Abstract: Data intake and query system (DIQS) instances supporting applications including lower-tier, focused, work group oriented applications, are tailored to display the metrics for the needs of the user. An interface caused by operation of an entity monitoring system (EMS) operating in conjunction with the lower-tier DIQS displays the monitored entities as individual representations. The user selects a metric and a metric threshold. The EMS causes a display of an interface having a representation for each monitored entity. Each representation includes a metric value and indicates an entity status based on the metric value and the threshold. The user can dynamically change the threshold on the interface for easy visualization of aggregation of monitored entities to determine the performance of the infrastructure. The interface also provides the user with the ability to select an entity and click through to the entity analysis workspace for more detailed information.

    Advanced persistent threat detection by an information technology and security operations application

    公开(公告)号:US11902306B1

    公开(公告)日:2024-02-13

    申请号:US16863911

    申请日:2020-04-30

    Applicant: Splunk Inc.

    Inventor: Sourabh Satish

    CPC classification number: H04L63/1425 H04L63/1441 H04L2463/121

    Abstract: Techniques are described for enabling an IT and security operations application to detect and remediate advanced persistent threats (APTs). The detection of APTs involves the execution of search queries to search event data that initially was associated with lower-severity activity or that otherwise did not initially rise to the level of actionable event data in the application. The execution of such search queries may thus generally be configured to search non-real-time event data, e.g., event data that outside of a current window of days or a week and instead searches and aggregates event data spanning time periods of many weeks, months, or years. Due the nature of APTs, analyses of historical event data spanning such relatively long periods of time may in the aggregate uncover the types of persistent activity associated with APTs that would otherwise go undetected based only on searches of more current, real-time event data.

Patent Agency Ranking